Showing 3,901 - 3,920 results of 6,432 for search '"memory"', query time: 0.09s Refine Results
  1. 3901

    A Precocious Cerebellar Ataxia and Frequent Fever Episodes in a 16-Month-Old Infant Revealing Ataxia-Telangiectasia Syndrome by Luigi Nespoli, Annapia Verri, Silvia Tajè, Francesco Paolo Pellegrini, Maddalena Marinoni

    Published 2013-01-01
    “…Peripheral lymphocytes subsets showed reduction of T cells with a marked predominance of T cells with a memory phenotype and a corresponding reduction of naïve T cells; NK cells were very increased (41%) with normal activity. …”
    Get full text
    Article
  2. 3902

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  3. 3903

    Improving the Forecast Accuracy of PM<sub>2.5</sub> Using SETAR-Tree Method: Case Study in Jakarta, Indonesia by Dinda Ayu Safira, Heri Kuswanto, Muhammad Ahsan

    Published 2024-12-01
    “…PM<sub>2.5</sub> exhibits significant nonlinear fluctuations; thus, this study employed two machine learning approaches: self-exciting threshold autoregressive tree (SETAR-Tree) and long short-term memory (LSTM). The SETAR-Tree model integrates regime-switching capabilities with decision tree principles to capture nonlinear patterns, while LSTM models long-term dependencies in time-series data. …”
    Get full text
    Article
  4. 3904

    An Improved Harmony Search Algorithm for Proactive Routing Protocol in VANET by Ravie Chandren Muniyandi, Mohammad Kamrul Hasan, Mustafa Raad Hammoodi, Ali Maroosi

    Published 2021-01-01
    “…Therefore, this paper aims to propose an improved harmony search optimization (EHSO) algorithm that considers the configuration of the OLSR parameters by coupling two stages, a procedure for optimization carried out by the EHSO algorithm based on embedding two popular selection methods in its memory, namely, roulette wheel selection and tournament selection. …”
    Get full text
    Article
  5. 3905

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. …”
    Get full text
    Article
  6. 3906

    WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches by Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, Adeel Akram, Muhammad Awais Azam

    Published 2024-12-01
    “…Then, we use three deep learning techniques, Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM), to classify the attacks. We implement and evaluate this proposed framework on the CICIDS2017 dataset. …”
    Get full text
    Article
  7. 3907

    Scolar, Mufti and Politician – Three “Lives” of Jakub Szynkiewicz by Diliara Usmanova

    Published 2023-10-01
    “…Both in the area of science and in the religious and administrative field, he achieved great success, leaving behind a significant legacy and a good memory. Perhaps only his political activity causes censure and various interpretations in modern literature, since it was based on the dubious basis of cooperation with a totalitarian, criminal regime. …”
    Get full text
    Article
  8. 3908

    Effectiveness of Badminton Physical Program on Mental Capacities in Healthy Older Adults by Wael Maktouf, Elmoetez Bellah Magtouf, Henrique P Neiva, Oussama Gaied Chortane

    Published 2024-12-01
    “…Older people suffer from reduced mental and cognitive parameters such as executive function, working memory and cognitive flexibility. However, information about how racquet sports can improve mental skills in older adults requires greater analysis and research. …”
    Get full text
    Article
  9. 3909

    Glucose Fluctuation Inhibits Nrf2 Signaling Pathway in Hippocampal Tissues and Exacerbates Cognitive Impairment in Streptozotocin-Induced Diabetic Rats by Haiyan Chi, Yujing Sun, Peng Lin, Junyu Zhou, Jinbiao Zhang, Yachao Yang, Yun Qiao, Deshan Liu

    Published 2024-01-01
    “…It was manifested that GF not only aggravated the impairment of spatial memory in rats with STZ-induced type 2 DM but also stimulated the loss, shrinkage, and apoptosis of hippocampal neurons. …”
    Get full text
    Article
  10. 3910

    Recognition model for major depressive disorder in Arabic user-generated content by Esraa M. Rabie, Atef F. Hashem, Fahad Kamal Alsheref

    Published 2025-01-01
    “…In multi-classification, we used DL techniques such as “long short-term memory (LSTM),” and used BERT transformers “Multilingual BERT.” …”
    Get full text
    Article
  11. 3911

    Follicular Helper CD4+ T Cells in Human Neuroautoimmune Diseases and Their Animal Models by Xueli Fan, Chenhong Lin, Jinming Han, Xinmei Jiang, Jie Zhu, Tao Jin

    Published 2015-01-01
    “…Follicular helper CD4+ T (TFH) cells play a fundamental role in humoral immunity deriving from their ability to provide help for germinal center (GC) formation, B cell differentiation into plasma cells and memory cells, and antibody production in secondary lymphoid tissues. …”
    Get full text
    Article
  12. 3912

    IGN: Invariable gene set-based normalization for chromatin accessibility profile data analysis by Shengen Shawn Hu, Hai-Hui Xue, Chongzhi Zang

    Published 2025-01-01
    “…We demonstrate the effectiveness of IGN in analyzing central memory CD8+ T cell activation, a system with anticipated global reprogramming of chromatin and gene expression, and show that IGN outperforms existing methods. …”
    Get full text
    Article
  13. 3913

    Feature Fusion Model Using Transfer Learning and Bidirectional Attention Mechanism for Plant Pipeline Leak Detection by Yujin Han, Yourak Choi, Jonghyuk Lee, Ji-Hoon Bae

    Published 2025-01-01
    “…In Stage 2, the classifier layers of the pre-trained models are removed, and the extracted features are fused and processed using a bidirectional long short-term memory (LSTM) network. An attention mechanism is incorporated within the LSTM to prioritize critical features, enhancing the ability of the model to distinguish leak signals from noise. …”
    Get full text
    Article
  14. 3914

    Amputee Gait Phase Recognition Using Multiple GMM-HMM by Wenyao Zhu, Zhenbang Liu, Yizhi Chen, Dejiu Chen, Zhonghai Lu

    Published 2024-01-01
    “…We compare our approach with the widely used CHMM (Continuous HMM) and LSTM (Long Short-term Memory) based methods, demonstrating better recognition accuracy performance across all scenarios.…”
    Get full text
    Article
  15. 3915

    The Short-Term Wind Power Forecasting by Utilizing Machine Learning and Hybrid Deep Learning Frameworks by Sunku V.S., Namboodiri V., Mukkamala R.

    Published 2025-02-01
    “…In pursuit of these objectives, the CNN GRU model was rigorously tested and compared against three additional models: CNN with bidirectional long short-term memory (BiLSTM), extreme gradient boosting (XGBoost), and random forest (RF). …”
    Get full text
    Article
  16. 3916

    Anomaly detection of adversarial cyber attacks on electric vehicle charging stations by Sagar Babu Mitikiri, Vedantham Lakshmi Srinivas, Mayukha Pal

    Published 2025-03-01
    “…An EVCI system is simulated in the MATLAB/SIMULINK environment for various scenarios of data generation. A Long Short Term Memory (LSTM) based autencoder model is used for predicting the charging port current magnitudes that capture the temporal dependencies in the sequential EVCI data. …”
    Get full text
    Article
  17. 3917

    Acute effects of virtual reality exercise bike games on psychophysiological outcomes in college North-African adolescents with cerebral palsy: A randomized clinical trial [version... by Mehdi Chlif, Amine Ghram, Makrem Soudani, Faical Farhat, Helmi Ben Saad

    Published 2024-11-01
    “…While participants in the VRE group exhibited enhanced attention levels and reported elevated levels of vigor subsequent to the exercise sessions, the memory results did not reach statistical significance. …”
    Get full text
    Article
  18. 3918

    A deep-learning approach to parameter fitting for a lithium metal battery cycling model, validated with experimental cell cycling time series by Maria Grazia Quarta, Ivonne Sgura, Elisa Emanuele, Jacopo Strada, Raquel Barreira, Benedetto Bozzini

    Published 2025-02-01
    “…Toward this goal, we propose the use of a Convolutional Neural Network-Long-Short Term Memory (CNN-LSTM) to identify relevant physico-chemical parameters in the PDE model and to describe the behaviour of simulated and experimental charge–discharge profiles. …”
    Get full text
    Article
  19. 3919
  20. 3920

    From light sensing to adaptive learning: hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing by Bashayr Alqahtani, Hanrui Li, Abdul Momin Syed, Nazek El-Atab

    Published 2025-01-01
    “…Although charge-based or emerging memory technologies such as memristors have been developed to emulate synaptic plasticity, replicating the key functionality of neurons—integrating diverse presynaptic inputs to fire electrical impulses—has remained challenging. …”
    Get full text
    Article